0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,629)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Emerging Technologies and Applications for Cloud-Based Gaming (Hardcover): P. Venkata Krishna Emerging Technologies and Applications for Cloud-Based Gaming (Hardcover)
P. Venkata Krishna
R4,886 Discovery Miles 48 860 Ships in 18 - 22 working days

Online gaming is widely popular and gaining more user attention every day. Computer game industries have made considerable growth in terms of design and development, but the scarcity of hardware resources at player or client side is a major pitfall for the latest high-end multimedia games. Cloud gaming is one proposed solution, allowing the end-user to play games using a variety of platforms with less demanding hardware requirements. Emerging Technologies and Applications for Cloud-Based Gaming explores the opportunities for the gaming industry through the integration of cloud computing. Focusing on design methodologies, fundamental architectures, and the end-user experience, this publication is an essential reference source for IT specialists, game developers, researchers, and graduate-level students.

Cloud Computing - Architecture and Applications (Hardcover): Jaydip Sen Cloud Computing - Architecture and Applications (Hardcover)
Jaydip Sen
R3,083 Discovery Miles 30 830 Ships in 18 - 22 working days
Network Models, Volume 7 (Hardcover): M.O. Ball, T.L. Magnanti, B. L. Monma, George L. Nemhauser Network Models, Volume 7 (Hardcover)
M.O. Ball, T.L. Magnanti, B. L. Monma, George L. Nemhauser
R2,015 Discovery Miles 20 150 Ships in 10 - 15 working days

The set of papers in this handbook reflect the varied theory and wide range of applications of network models. Two of the most vibrant applications areas of network models are telecommunications and transportation. Several chapters explicitly model issues arising in these problem domains. Research on network models has been closely aligned with the field of computer science both in developing data structures for efficiently implementing network algorithms and in analyzing the complexity of network problems and algorithms. The basic structure underlying all network problems is a graph. Thus, historically, there have been strong ties between network models and graph theory. A companion volume in the "Handbook" series, entitled "Network Routing", examines problems related to the movement of commodities over a network. The problems treated arise in several application areas including logistics, telecommunications, facility location, VLSI design, and economics.

Information Systems Engineering - From Data Analysis to Process Networks (Hardcover): Paul Johannesson, Eva Soderstrom Information Systems Engineering - From Data Analysis to Process Networks (Hardcover)
Paul Johannesson, Eva Soderstrom
R2,631 Discovery Miles 26 310 Ships in 18 - 22 working days

Information systems belong to the most complex artifacts built in today's society. Developing, maintaining, and using an information system raises a large number of difficult problems, ranging from purely technical to organizational and social. ""Information Systems Engineering"" presents the most current research on existing and emergent trends on conceptual modeling and information systems engineering, bridging the gap between research and practice by providing a much-needed reference point on the design of software systems that evolve seamlessly to adapt to rapidly changing business and organizational practices.

Cloud Computing for Teaching and Learning - Strategies for Design and Implementation (Hardcover): Lee Chao Cloud Computing for Teaching and Learning - Strategies for Design and Implementation (Hardcover)
Lee Chao
R4,465 Discovery Miles 44 650 Ships in 18 - 22 working days

With its cost efficiency, enabling of collaboration and sharing of resources, and its ability to improve access, cloud computing is likely to play a big role in the classrooms of tomorrow. Cloud Computing for Teaching and Learning: Strategies for Design and Implementation provides the latest information about cloud development and cloud applications in teaching and learning. The book alsos include empirical research findings in these areas for professionals and researchers working in the field of e-learning who want to implement teaching and learning with cloud computing, as well as provide insights and support to executives concerned with cloud development and cloud applications in e-learning communities and environments.

Strategic Engineering for Cloud Computing and Big Data Analytics (Hardcover, 1st ed. 2017): Amin Hosseinian-Far, Muthu... Strategic Engineering for Cloud Computing and Big Data Analytics (Hardcover, 1st ed. 2017)
Amin Hosseinian-Far, Muthu Ramachandran, Dilshad Sarwar
R4,627 Discovery Miles 46 270 Ships in 10 - 15 working days

This book demonstrates the use of a wide range of strategic engineering concepts, theories and applied case studies to improve the safety, security and sustainability of complex and large-scale engineering and computer systems. It first details the concepts of system design, life cycle, impact assessment and security to show how these ideas can be brought to bear on the modeling, analysis and design of information systems with a focused view on cloud-computing systems and big data analytics. This informative book is a valuable resource for graduate students, researchers and industry-based practitioners working in engineering, information and business systems as well as strategy.

Managing the Web of Things - Linking the Real World to the Web (Paperback): Michael Sheng, Yongrui Qin, Lina Yao, Boualem... Managing the Web of Things - Linking the Real World to the Web (Paperback)
Michael Sheng, Yongrui Qin, Lina Yao, Boualem Benatallah
R1,901 Discovery Miles 19 010 Ships in 10 - 15 working days

Managing the Web of Things: Linking the Real World to the Web presents a consolidated and holistic coverage of engineering, management, and analytics of the Internet of Things. The web has gone through many transformations, from traditional linking and sharing of computers and documents (i.e., Web of Data), to the current connection of people (i.e., Web of People), and to the emerging connection of billions of physical objects (i.e., Web of Things). With increasing numbers of electronic devices and systems providing different services to people, Web of Things applications present numerous challenges to research institutions, companies, governments, international organizations, and others. This book compiles the newest developments and advances in the area of the Web of Things, ranging from modeling, searching, and data analytics, to software building, applications, and social impact. Its coverage will enable effective exploration, understanding, assessment, comparison, and the selection of WoT models, languages, techniques, platforms, and tools. Readers will gain an up-to-date understanding of the Web of Things systems that accelerates their research.

Intelligent Processing Algorithms and Applications for GPS Positioning Data of Qinghai-Tibet Railway (Hardcover, 1st ed. 2019):... Intelligent Processing Algorithms and Applications for GPS Positioning Data of Qinghai-Tibet Railway (Hardcover, 1st ed. 2019)
Dewang Chen, Ruijun Cheng
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Taking the Qinghai-Tibet Railway as an example, this book introduces intelligent processing for Global Positioning Data (GPS) data. Combining theory with practical applications, it provides essential insights into the Chinese Qinghai-Tibet Railway and novel methods of data processing for GPS satellite positioning, making it a valuable resource for all those working with train control systems, train positioning systems, satellite positioning, and intelligent data processing. As satellite positioning guarantees the safe and efficient operation of train control systems, it focuses on how to best process the GPS data collected, including methods for error detection, reduction and information fusion.

International Cybersecurity and Privacy Law in Practice (Hardcover, New edition): Charlotte A Tschider International Cybersecurity and Privacy Law in Practice (Hardcover, New edition)
Charlotte A Tschider
R5,222 Discovery Miles 52 220 Ships in 18 - 22 working days
Glass Houses - Privacy, Secrecy, and Cyber Insecurity in a Transparent World (Paperback): Joel Brenner Glass Houses - Privacy, Secrecy, and Cyber Insecurity in a Transparent World (Paperback)
Joel Brenner
R519 Discovery Miles 5 190 Ships in 18 - 22 working days

A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace.
Like the rest of us, governments and corporations inhabit "glass houses," all but transparent to a new generation of spies who operate remotely from such places as China, the Middle East, Russia, and even France. In this urgent wake-up call, Brenner draws on his extraordinary background to show what we can--and cannot--do to prevent cyber spies and hackers from compromising our security and stealing our latest technology.

Fundamentals and Applications of Hardcopy Communication - Conveying Side Information by Printed Media (Hardcover, 1st ed.... Fundamentals and Applications of Hardcopy Communication - Conveying Side Information by Printed Media (Hardcover, 1st ed. 2018)
Joceli Mayer, Paulo V.K. Borges, Steven J. Simske
R2,012 R1,787 Discovery Miles 17 870 Save R225 (11%) Ships in 10 - 15 working days

This book presents covert, semi-covert and overt techniques for communication over printed media by modifying images, texts or barcodes within the document. Basic and advanced techniques are discussed aimed to modulate information into images, texts and barcodes. Conveying information over printed media can be useful for content authentication, author copyright, information and piracy product deterrent, side information for marketing, among other applications. Practical issues are discussed and experiments are provided to evaluate competitive approaches for hard-copy communication. This book is a useful resource for researchers, practitioners and graduate students in the field of hard-copy communication by providing the fundamentals, basic and advanced techniques as examples of approaches to address the hard-copy media distortions and particularities.

Enterprise Resource Planning and Business Intelligence Systems for Information Quality - An Empirical Analysis in the Italian... Enterprise Resource Planning and Business Intelligence Systems for Information Quality - An Empirical Analysis in the Italian Setting (Hardcover, 1st ed. 2018)
Carlo Caserio, Sara Trucco
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book analyses the role of Enterprise Resource Planning (ERP) and Business Intelligence (BI) systems in improving information quality through an empirical analysis carried out in Italy. The study begins with a detailed examination of ERP features that highlights the advantages and disadvantages of ERP adoption. Critical success factors for ERP implementation and post-implementation are then discussed, along with the capabilities of ERP in driving the alignment between management accounting and financial accounting information.The study goes on to illustrate the features of BI systems and to summarize companies' needs for BI. Critical success factors for BI implementation are then presented, along with the BI maturity model and lifecycle. The focus of the research entails a detailed empirical analysis in the Italian setting designed to investigate the role played by ERP and BI systems in reducing information overload/underload and improving information quality by influencing the features of information flow. The practical and theoretical implications of the study are discussed and future avenues of research are suggested. This book will be of value for all those who have an interest in the capacities of ERP and BI systems to enhance business information quality.

Introduction to Telecommunications Network Engineering (Hardcover): Tarmo Anttalainen Introduction to Telecommunications Network Engineering (Hardcover)
Tarmo Anttalainen
R2,889 Discovery Miles 28 890 Ships in 18 - 22 working days

This book provides an introduction to telecommunications network engineering, including voice, data, and mobile cellular systems. It takes a non-technical approach to explain the variety of technologies and services available to users as a result of rapid growth and deregulation of the telecommunications business. Readers learn how the different technologies work, how telecommunication networks operate, and what options can best be utilized.

Social Capital Modeling in Virtual Communities - Bayesian Belief Network Approaches (Hardcover): Ben Kei Daniel Social Capital Modeling in Virtual Communities - Bayesian Belief Network Approaches (Hardcover)
Ben Kei Daniel
R4,152 Discovery Miles 41 520 Ships in 18 - 22 working days

Throughout history, the permeation of new technologies have assisted communities in their aim to collectively work together in addressing shared problems for the attainment of specific goals and outcomes. Social Capital Modeling in Virtual Communities: Bayesian Belief Network Approaches broadly examines what constitutes social capital in geographical communities and offers an in-depth description of its potential in virtual communities. Providing the latest findings for advanced undergraduate and graduate students as well as researchers and academicians involved with virtual communities and social capital, this book draws upon insights from interdisciplinary fields such as artificial intelligence, human computer interaction, educational technology, and economics and sociology.

Enterprise Level Security 1 & 2 (Paperback): Kevin Foltz, William R. Simpson Enterprise Level Security 1 & 2 (Paperback)
Kevin Foltz, William R. Simpson
R1,418 Discovery Miles 14 180 Ships in 10 - 15 working days

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

Persuasive Communication for Science and Technology Leaders - Writing and Speaking with Confidence (Hardcover): S Wilbers Persuasive Communication for Science and Technology Leaders - Writing and Speaking with Confidence (Hardcover)
S Wilbers
R2,073 Discovery Miles 20 730 Ships in 18 - 22 working days

Persuasive Communication for Science and Technology Leaders Explore this insightful guide to the development of persuasive leadership skills perfect for students and managers in technical fields Many technical managers receive little or no training in the persuasive arts. Though technically skilled, they often lack the ability to engage effectively with an audiences outside their field. Persuasive Communication for Science and Technology Leaders: Writing and Speaking with Confidence delivers a thorough treatment of how to connect with audiences whose knowledge, values, personal experiences, ethnic background, gender, and worldview may differ from their own. Written in a highly readable and entertaining style, this book goes beyond the scope of a standard textbook on persuasive communication. Its practical lessons illustrate the techniques of effective scientific and technical writing while emphasizing values-based leadership for a more just, inclusive, and sustainable world, a theme that seems particularly pertinent during these times of multiple crises, misinformation campaigns, and science denial. The distinguished speaker and author explores the broader importance of language and explains various techniques for expanding your expressive range and your professional influence. He will also teach you methods for conveying information clearly and precisely as well as in ways that inspire and leave a lasting impression. You will also benefit from: A thorough introduction to knowing and connecting with your audience, using voice, tone, and point of view for results, and engaging your reader with compelling openings An exploration of explaining complex technologies clearly, succeeding with challenging writing assignments, and applying a variety of persuasive strategies for agile responses to a rapidly changing world An examination of speaking effectively while thinking on your feet, including how to create a safety net and how to recover from momentary lapses Easy-to-remember guidance on avoiding common language errors that might undermine your credibility or, worse yet, make people stop listening to you Perfect for undergraduate and graduate students in scientific and technical fields such as engineering, geology, botany, climatology, and epidemiology, Persuasive Communication for Science and Technology Leaders: Writing and Speaking with Confidence will earn a place in the libraries of technical managers and leaders who seek to better connect with their audiences.

Design Solutions for User-Centric Information Systems (Hardcover): Saqib Saeed, Yasser A Bamarouf, T Ramayah, Zafar Iqbal Design Solutions for User-Centric Information Systems (Hardcover)
Saqib Saeed, Yasser A Bamarouf, T Ramayah, Zafar Iqbal
R5,459 Discovery Miles 54 590 Ships in 18 - 22 working days

Continuous improvements in technological applications have allowed more opportunities to develop systems with user-focused designs. This not only leads to higher success in day-to-day usage, but it increases the overall probability of technology adoption. Design Solutions for User-Centric Information Systems provides a comprehensive examination of the latest strategies and methods for creating technological systems with end users as the focal point of the design process. Highlighting innovative practices and applications across a variety of areas, such as cloud-based computing services, e-government adoption, and logistics evaluation, this book is an ideal reference source for computer engineers, practitioners, project managers, graduate students, and researchers interested in the enhancement of user-centric information system development.

De-mystifying the IPsec Puzzle (Hardcover): Shiela Frankel De-mystifying the IPsec Puzzle (Hardcover)
Shiela Frankel
R2,433 Discovery Miles 24 330 Ships in 18 - 22 working days

Now that the Internet has blossomed into the "Information Superhighway" with its traffic and drivers becoming increasingly diverse, security has emerged as a primary concern. This book offers the reader a global, integrated approach to providing internet security at the network layer. The author gives a detailed presentation of the revolutionary IPsec technology used today to create Virtual Private Networks and, in the near future, to protect the infrastructure of the Internet itself. The book addresses IPsec's major aspects and components to help the reader evaluate and compare features of different implementations. It provides a detailed understanding of this cutting-edge technology from the inside, which enables the reader to more effectively troubleshoot problems with specific products. Based on standards documents, discussion list archives, and practitioners' lore, this resource collects all the current knowledge of IPsec and describes it in a literate, clear manner.

Secure Data Networking (Hardcover): Michael Purser Secure Data Networking (Hardcover)
Michael Purser
R2,851 Discovery Miles 28 510 Ships in 18 - 22 working days

This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms.

Introduction to Microelectromechanical (MEM) Microwave Systems (Hardcover): Hector J de los Santos Introduction to Microelectromechanical (MEM) Microwave Systems (Hardcover)
Hector J de los Santos
R3,188 Discovery Miles 31 880 Ships in 18 - 22 working days

Microelectromechanical sytems (MEMS) applications in RF and microwave electronics are revolutionizing wireless communications. This text provides a comprehensive explanation of the fabrication and fundamental physics of MEMS and their applications in electronic communication systems. The book integrates circuit fabrication technology, device design-oriented materials, mechanical and microwave considerations, and RF/microwave electronics to give engineers and managers a clear understanding of the potential and limitations of MEMS in electronic communications.

Weaponizing Cyberspace - Inside Russia's Hostile Activities (Hardcover): Nicholas Michael Sambaluk Weaponizing Cyberspace - Inside Russia's Hostile Activities (Hardcover)
Nicholas Michael Sambaluk
R2,506 R2,369 Discovery Miles 23 690 Save R137 (5%) Ships in 10 - 15 working days

The Russian regime's struggle for internal control drives multifaceted actions in cyberspace that do not stop at national borders. Cybercrime, technical hacking, and disinformation are complementary tools to preserve national power internally while projecting effects onto myriad neighbors and rivals. Russian activity in the cyber domain is infamous in the United States and other Western countries. Weaponizing Cyberspace explores the Russian proclivity, particularly in the 21st century, for using cyberspace as an environment in which to launch technical attacks and disinformation campaigns that sow chaos and distraction in ways that provide short-term advantage to autocrats in the Kremlin. Arguing that Russia's goal is to divide people, Sambaluk explains that Russia's modus operandi in disinformation campaigning is specifically to find and exploit existing sore spots in other countries. In the U.S., this often means inflaming political tensions among people on the far left and far right. Russia's actions have taken different forms, including the sophisticated surveillance and sabotage of critical infrastructure, the ransoming of data by criminal groups, and a welter of often mutually contradictory disinformation messages that pollute online discourse within and beyond Russia. Whether deployed to contribute to hybrid war or to psychological fracture and disillusionment in targeted societies, the threat is real and must be understood and effectively addressed. Explains how the legacy of Soviet information operations and the modern examples of Russian information operations are similar but not identical to one another Explores the development of Russian domestic information operations techniques that can now be applied against foreign powers Describes the relationships between technical attacks and disinformation often used in confrontations with countries along Russia's borders Examines the role of Russian information operations in U.S. social and political discourse Considers the implications of other countries' reactions that attempt to eliminate the Russian information operation's ability to influence society

Learning from Imbalanced Data Sets (Hardcover, 1st ed. 2018): Alberto Fernandez, Salvador Garcia, Mikel Galar, Ronaldo C.... Learning from Imbalanced Data Sets (Hardcover, 1st ed. 2018)
Alberto Fernandez, Salvador Garcia, Mikel Galar, Ronaldo C. Prati, Bartosz Krawczyk, …
R4,006 Discovery Miles 40 060 Ships in 10 - 15 working days

This book provides a general and comprehensible overview of imbalanced learning. It contains a formal description of a problem, and focuses on its main features, and the most relevant proposed solutions. Additionally, it considers the different scenarios in Data Science for which the imbalanced classification can create a real challenge. This book stresses the gap with standard classification tasks by reviewing the case studies and ad-hoc performance metrics that are applied in this area. It also covers the different approaches that have been traditionally applied to address the binary skewed class distribution. Specifically, it reviews cost-sensitive learning, data-level preprocessing methods and algorithm-level solutions, taking also into account those ensemble-learning solutions that embed any of the former alternatives. Furthermore, it focuses on the extension of the problem for multi-class problems, where the former classical methods are no longer to be applied in a straightforward way. This book also focuses on the data intrinsic characteristics that are the main causes which, added to the uneven class distribution, truly hinders the performance of classification algorithms in this scenario. Then, some notes on data reduction are provided in order to understand the advantages related to the use of this type of approaches. Finally this book introduces some novel areas of study that are gathering a deeper attention on the imbalanced data issue. Specifically, it considers the classification of data streams, non-classical classification problems, and the scalability related to Big Data. Examples of software libraries and modules to address imbalanced classification are provided. This book is highly suitable for technical professionals, senior undergraduate and graduate students in the areas of data science, computer science and engineering. It will also be useful for scientists and researchers to gain insight on the current developments in this area of study, as well as future research directions.

Candidate Multilinear Maps (Hardcover): Sanjam Garg Candidate Multilinear Maps (Hardcover)
Sanjam Garg
R1,770 Discovery Miles 17 700 Ships in 18 - 22 working days

The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more. In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.

Face Recognition (Hardcover): Milos Oravec Face Recognition (Hardcover)
Milos Oravec
R3,613 Discovery Miles 36 130 Ships in 18 - 22 working days
Communication and Computing for Distributed Multimedia Systems (Hardcover): Guojun Lu Communication and Computing for Distributed Multimedia Systems (Hardcover)
Guojun Lu
R3,536 Discovery Miles 35 360 Ships in 18 - 22 working days

Here's the first focused discussion of issues and technology in developing networked multimedia systems. This book includes a unique explanation of color specification and its role in achieving high picture quality, high compression ratio and high information retrieval performance, plus valuable coverage of principles and techniques of multimedia information indexing and retrieval critical for future systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
Network Routing, Volume 8
M.O. Ball, T.L. Magnanti, … Hardcover R1,550 Discovery Miles 15 500
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,200 Discovery Miles 62 000
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610

 

Partners